From 0248e68ba435ba8e0afa6648270303d2d0a7ca1f Mon Sep 17 00:00:00 2001 From: epoberezkin Date: Sat, 24 Feb 2024 21:29:27 +0000 Subject: [PATCH] deploy: 7213913d5123c6faa759899c77c4ce592599fb02 --- ar/contact/index.html | 2 +- ar/fdroid/index.html | 2 +- ar/index.html | 2 +- ar/invitation/index.html | 2 +- bg/contact/index.html | 2 +- bg/fdroid/index.html | 2 +- bg/index.html | 2 +- bg/invitation/index.html | 2 +- blog/index.html | 2 +- contact/index.html | 2 +- cs/contact/index.html | 2 +- cs/fdroid/index.html | 2 +- cs/index.html | 2 +- cs/invitation/index.html | 2 +- de/contact/index.html | 2 +- de/fdroid/index.html | 2 +- de/index.html | 2 +- de/invitation/index.html | 2 +- docs/glossary.html | 6 ++++++ en/contact/index.html | 2 +- en/fdroid/index.html | 2 +- en/index.html | 2 +- en/invitation/index.html | 2 +- es/contact/index.html | 2 +- es/fdroid/index.html | 2 +- es/index.html | 2 +- es/invitation/index.html | 2 +- fdroid/index.html | 2 +- fi/contact/index.html | 2 +- fi/fdroid/index.html | 2 +- fi/index.html | 2 +- fi/invitation/index.html | 2 +- fr/contact/index.html | 2 +- fr/fdroid/index.html | 2 +- fr/index.html | 2 +- fr/invitation/index.html | 2 +- he/contact/index.html | 2 +- he/fdroid/index.html | 2 +- he/index.html | 2 +- he/invitation/index.html | 2 +- index.html | 2 +- invitation/index.html | 2 +- it/contact/index.html | 2 +- it/fdroid/index.html | 2 +- it/index.html | 2 +- it/invitation/index.html | 2 +- ja/contact/index.html | 2 +- ja/fdroid/index.html | 2 +- ja/index.html | 2 +- ja/invitation/index.html | 2 +- nl/contact/index.html | 2 +- nl/fdroid/index.html | 2 +- nl/index.html | 2 +- nl/invitation/index.html | 2 +- pl/contact/index.html | 2 +- pl/fdroid/index.html | 2 +- pl/index.html | 2 +- pl/invitation/index.html | 2 +- pt_BR/contact/index.html | 2 +- pt_BR/fdroid/index.html | 2 +- pt_BR/index.html | 2 +- pt_BR/invitation/index.html | 2 +- ru/contact/index.html | 2 +- ru/fdroid/index.html | 2 +- ru/index.html | 2 +- ru/invitation/index.html | 2 +- uk/contact/index.html | 2 +- uk/fdroid/index.html | 2 +- uk/index.html | 2 +- uk/invitation/index.html | 2 +- zh_Hans/contact/index.html | 2 +- zh_Hans/fdroid/index.html | 2 +- zh_Hans/index.html | 2 +- zh_Hans/invitation/index.html | 2 +- zh_Hant/contact/index.html | 2 +- zh_Hant/fdroid/index.html | 2 +- zh_Hant/index.html | 2 +- zh_Hant/invitation/index.html | 2 +- 78 files changed, 83 insertions(+), 77 deletions(-) diff --git a/ar/contact/index.html b/ar/contact/index.html index bc2b6b5f0..3535dcb51 100644 --- a/ar/contact/index.html +++ b/ar/contact/index.html @@ -787,7 +787,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ar/fdroid/index.html b/ar/fdroid/index.html index 8f01b8f59..e97bedcd9 100644 --- a/ar/fdroid/index.html +++ b/ar/fdroid/index.html @@ -626,7 +626,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ar/index.html b/ar/index.html index c3d1f7e97..112a5ab0d 100644 --- a/ar/index.html +++ b/ar/index.html @@ -2049,7 +2049,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ar/invitation/index.html b/ar/invitation/index.html index d5ad4a67b..1bfd5ae77 100644 --- a/ar/invitation/index.html +++ b/ar/invitation/index.html @@ -787,7 +787,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/bg/contact/index.html b/bg/contact/index.html index 6ab08f97d..89b47bb00 100644 --- a/bg/contact/index.html +++ b/bg/contact/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/bg/fdroid/index.html b/bg/fdroid/index.html index 49141fcfe..b6812ba57 100644 --- a/bg/fdroid/index.html +++ b/bg/fdroid/index.html @@ -616,7 +616,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/bg/index.html b/bg/index.html index 4cea11e35..c56efb1f7 100644 --- a/bg/index.html +++ b/bg/index.html @@ -2039,7 +2039,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    +

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    diff --git a/bg/invitation/index.html b/bg/invitation/index.html index 901d4b776..6e8514e86 100644 --- a/bg/invitation/index.html +++ b/bg/invitation/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/blog/index.html b/blog/index.html index 150628c2c..0ff9b57b4 100644 --- a/blog/index.html +++ b/blog/index.html @@ -1447,7 +1447,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/contact/index.html b/contact/index.html index c1619428a..1e884bcdc 100644 --- a/contact/index.html +++ b/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/cs/contact/index.html b/cs/contact/index.html index c5a443561..7fcc1ba79 100644 --- a/cs/contact/index.html +++ b/cs/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/cs/fdroid/index.html b/cs/fdroid/index.html index 08f975fec..40bfc80ca 100644 --- a/cs/fdroid/index.html +++ b/cs/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/cs/index.html b/cs/index.html index 2c1d49b93..751254147 100644 --- a/cs/index.html +++ b/cs/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/cs/invitation/index.html b/cs/invitation/index.html index f6dd6a0a9..dbdfc9170 100644 --- a/cs/invitation/index.html +++ b/cs/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/de/contact/index.html b/de/contact/index.html index ecacbb6ff..b3cb1fe9c 100644 --- a/de/contact/index.html +++ b/de/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/de/fdroid/index.html b/de/fdroid/index.html index e31dd18e2..b2f467803 100644 --- a/de/fdroid/index.html +++ b/de/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/de/index.html b/de/index.html index b977c249f..b08583aaa 100644 --- a/de/index.html +++ b/de/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Peer-to-peer

    Peer-to-peer (P2P) is the network architecture when participants have equal rights and communicate directly via a general purpose transport or overlay network. Unlike client-server architecture, all peers in a P2P network both provide and consume the resources. In the context of messaging, P2P architecture usually means that the messages are sent between peers, without user accounts or messages being stored on any servers. Examples are Tox, Briar, Cwtch and many others.

    +

    Wikipedia

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Peer-to-peer

    Peer-to-peer (P2P) is the network architecture when participants have equal rights and communicate directly via a general purpose transport or overlay network. Unlike client-server architecture, all peers in a P2P network both provide and consume the resources. In the context of messaging, P2P architecture usually means that the messages are sent between peers, without user accounts or messages being stored on any servers. Examples are Tox, Briar, Cwtch and many others.

    diff --git a/de/invitation/index.html b/de/invitation/index.html index dd3a2fc87..e9c743ebc 100644 --- a/de/invitation/index.html +++ b/de/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/docs/glossary.html b/docs/glossary.html index 8ae6372f5..a7aad07e8 100644 --- a/docs/glossary.html +++ b/docs/glossary.html @@ -763,6 +763,9 @@ window.addEventListener('scroll',changeHeaderBg);

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    SimpleX Clients also form a network using SMP relays and IP or some other overlay network (e.g., Tor), to communicate with each other. SMP relays, on another hand, do not form a network.

    Wikipedia

    +

    Non-repudiation

    +

    The property of the cryptographic or communication system that allows the recipient of the message to prove to any third party that the sender identified by some cryptographic key sent the message. It is the opposite to repudiation. While in some context non-repudiation may be desirable (e.g., for contractually binding messages), in the context of private communications it may be undesirable.

    +

    Wikipedia

    Pairwise pseudonymous identifier

    Generalizing the definition from NIST Digital Identity Guidelines, it is an opaque unguessable identifier generated by a service used to access a resource by only one party.

    In the context of SimpleX network, these are the identifiers generated by SMP relays to access anonymous messaging queues, with a separate identifier (and access credential) for each accessing party: recipient, sender and and optional notifications subscriber. The same approach is used by XFTP relays to access file chunks, with separate identifiers (and access credentials) for sender and each recipient.

    @@ -784,6 +787,9 @@ window.addEventListener('scroll',changeHeaderBg);

    Network topology of the communication system when peers communicate via proxies that do not form the network themselves. Such design is used in Pond, that has a fixed home server for each user, and in SimpleX, that uses multiple relays providing temporary connections.

    Recovery from compromise

    Post-compromise security.

    +

    Repudiation

    +

    The property of the cryptographic or communication system that allows the sender of the message to plausibly deny having sent the message, because while the recipient can verify that the message was sent by the sender, they cannot prove it to any third party - the recipient has a technical ability to forge the same encrypted message. This is an important quality of private communications, as it allows to have the conversation that can later be denied, similarly to having a private face-to-face conversation.

    +

    See also non-repudiation.

    User identity

    In a communication system it refers to anything that uniquely identifies the users to the network. Depending on the communication network, it can be a phone number, email address, username, public key or a random opaque identifier. Most messaging networks rely on some form of user identity. SimpleX appears to be the only messaging network that does not rely on any kind of user identity - see this comparison.

    diff --git a/en/contact/index.html b/en/contact/index.html index c1619428a..1e884bcdc 100644 --- a/en/contact/index.html +++ b/en/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/en/fdroid/index.html b/en/fdroid/index.html index ae63895fa..b837b4514 100644 --- a/en/fdroid/index.html +++ b/en/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/en/index.html b/en/index.html index 01091af2a..e0883f449 100644 --- a/en/index.html +++ b/en/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    +

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    diff --git a/en/invitation/index.html b/en/invitation/index.html index 6065d8f0c..9a7cbbeb2 100644 --- a/en/invitation/index.html +++ b/en/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/es/contact/index.html b/es/contact/index.html index 0605b76dd..3b080bcd3 100644 --- a/es/contact/index.html +++ b/es/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/es/fdroid/index.html b/es/fdroid/index.html index 2f84355be..95bb004c0 100644 --- a/es/fdroid/index.html +++ b/es/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/es/index.html b/es/index.html index 243d1cc5d..65a57838b 100644 --- a/es/index.html +++ b/es/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/es/invitation/index.html b/es/invitation/index.html index 0e89b54c9..4d52133ea 100644 --- a/es/invitation/index.html +++ b/es/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fdroid/index.html b/fdroid/index.html index ae63895fa..b837b4514 100644 --- a/fdroid/index.html +++ b/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fi/contact/index.html b/fi/contact/index.html index 8e1b30283..8fd45254e 100644 --- a/fi/contact/index.html +++ b/fi/contact/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fi/fdroid/index.html b/fi/fdroid/index.html index 8e26713ea..2d9647c32 100644 --- a/fi/fdroid/index.html +++ b/fi/fdroid/index.html @@ -616,7 +616,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fi/index.html b/fi/index.html index 50c4c53d3..816cab1d4 100644 --- a/fi/index.html +++ b/fi/index.html @@ -2039,7 +2039,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fi/invitation/index.html b/fi/invitation/index.html index 67a7710ad..514bb846f 100644 --- a/fi/invitation/index.html +++ b/fi/invitation/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fr/contact/index.html b/fr/contact/index.html index b3beb22c1..9c3ddfaef 100644 --- a/fr/contact/index.html +++ b/fr/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fr/fdroid/index.html b/fr/fdroid/index.html index 6505d8e36..0f9794749 100644 --- a/fr/fdroid/index.html +++ b/fr/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fr/index.html b/fr/index.html index bf20368df..f9a04ef21 100644 --- a/fr/index.html +++ b/fr/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/fr/invitation/index.html b/fr/invitation/index.html index 8608a30d3..6c5e11541 100644 --- a/fr/invitation/index.html +++ b/fr/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/he/contact/index.html b/he/contact/index.html index f8d88a961..72f7753f4 100644 --- a/he/contact/index.html +++ b/he/contact/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/he/fdroid/index.html b/he/fdroid/index.html index 51bf6f9c4..bad06372c 100644 --- a/he/fdroid/index.html +++ b/he/fdroid/index.html @@ -616,7 +616,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/he/index.html b/he/index.html index c532b8e51..b15ce9b22 100644 --- a/he/index.html +++ b/he/index.html @@ -2039,7 +2039,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/he/invitation/index.html b/he/invitation/index.html index ae13efc7b..cae601349 100644 --- a/he/invitation/index.html +++ b/he/invitation/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/index.html b/index.html index 01091af2a..e0883f449 100644 --- a/index.html +++ b/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    +

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    diff --git a/invitation/index.html b/invitation/index.html index 6065d8f0c..9a7cbbeb2 100644 --- a/invitation/index.html +++ b/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/it/contact/index.html b/it/contact/index.html index e731f54c1..640a6d7f2 100644 --- a/it/contact/index.html +++ b/it/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/it/fdroid/index.html b/it/fdroid/index.html index 05ca00df5..731652812 100644 --- a/it/fdroid/index.html +++ b/it/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/it/index.html b/it/index.html index 25120e749..45401a17c 100644 --- a/it/index.html +++ b/it/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    +

    Wikipedia

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    diff --git a/it/invitation/index.html b/it/invitation/index.html index 86ea76bef..b7aa8ba44 100644 --- a/it/invitation/index.html +++ b/it/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ja/contact/index.html b/ja/contact/index.html index 37c78fdf2..8c4735b21 100644 --- a/ja/contact/index.html +++ b/ja/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ja/fdroid/index.html b/ja/fdroid/index.html index 4b7baeaf8..91110371e 100644 --- a/ja/fdroid/index.html +++ b/ja/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ja/index.html b/ja/index.html index a0c905489..ab37d2387 100644 --- a/ja/index.html +++ b/ja/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ja/invitation/index.html b/ja/invitation/index.html index f73b69ba9..43c5ba5fb 100644 --- a/ja/invitation/index.html +++ b/ja/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/nl/contact/index.html b/nl/contact/index.html index 2abd41587..1c398e84c 100644 --- a/nl/contact/index.html +++ b/nl/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/nl/fdroid/index.html b/nl/fdroid/index.html index d46a2ded5..20a42f379 100644 --- a/nl/fdroid/index.html +++ b/nl/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/nl/index.html b/nl/index.html index aa9a13b04..b296eac49 100644 --- a/nl/index.html +++ b/nl/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/nl/invitation/index.html b/nl/invitation/index.html index fa2491ea2..5de9c2967 100644 --- a/nl/invitation/index.html +++ b/nl/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/pl/contact/index.html b/pl/contact/index.html index 40bca2fe0..4c54c183e 100644 --- a/pl/contact/index.html +++ b/pl/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/pl/fdroid/index.html b/pl/fdroid/index.html index f1583fae6..8e8af97fe 100644 --- a/pl/fdroid/index.html +++ b/pl/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/pl/index.html b/pl/index.html index 731f8a2b1..1c620e0db 100644 --- a/pl/index.html +++ b/pl/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    +

    Wikipedia

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    diff --git a/pl/invitation/index.html b/pl/invitation/index.html index 896a7927b..db4ef4f6a 100644 --- a/pl/invitation/index.html +++ b/pl/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/pt_BR/contact/index.html b/pt_BR/contact/index.html index 7121f2dfe..530bd0fa4 100644 --- a/pt_BR/contact/index.html +++ b/pt_BR/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/pt_BR/fdroid/index.html b/pt_BR/fdroid/index.html index 2a12fcc86..5f2fe39ee 100644 --- a/pt_BR/fdroid/index.html +++ b/pt_BR/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/pt_BR/index.html b/pt_BR/index.html index 711e81e1a..5b6d71326 100644 --- a/pt_BR/index.html +++ b/pt_BR/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/pt_BR/invitation/index.html b/pt_BR/invitation/index.html index c1737dad7..b72a7cbfd 100644 --- a/pt_BR/invitation/index.html +++ b/pt_BR/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ru/contact/index.html b/ru/contact/index.html index a2429509a..a104b6a27 100644 --- a/ru/contact/index.html +++ b/ru/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ru/fdroid/index.html b/ru/fdroid/index.html index 881b54a4d..dfe37787d 100644 --- a/ru/fdroid/index.html +++ b/ru/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ru/index.html b/ru/index.html index d5d761764..24db06eef 100644 --- a/ru/index.html +++ b/ru/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/ru/invitation/index.html b/ru/invitation/index.html index eabfbd7c9..1f9c895ad 100644 --- a/ru/invitation/index.html +++ b/ru/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/uk/contact/index.html b/uk/contact/index.html index 6857163f6..a287873bd 100644 --- a/uk/contact/index.html +++ b/uk/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/uk/fdroid/index.html b/uk/fdroid/index.html index 8a36dcb16..6b1ceac07 100644 --- a/uk/fdroid/index.html +++ b/uk/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/uk/index.html b/uk/index.html index 9acf0c54f..2ac028c99 100644 --- a/uk/index.html +++ b/uk/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/uk/invitation/index.html b/uk/invitation/index.html index 2d194f89b..0429a2f5c 100644 --- a/uk/invitation/index.html +++ b/uk/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/zh_Hans/contact/index.html b/zh_Hans/contact/index.html index 4f48ad8b0..d36ec7cb7 100644 --- a/zh_Hans/contact/index.html +++ b/zh_Hans/contact/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/zh_Hans/fdroid/index.html b/zh_Hans/fdroid/index.html index 919454222..e3cbd0335 100644 --- a/zh_Hans/fdroid/index.html +++ b/zh_Hans/fdroid/index.html @@ -624,7 +624,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/zh_Hans/index.html b/zh_Hans/index.html index 0456cf7b1..71a50c987 100644 --- a/zh_Hans/index.html +++ b/zh_Hans/index.html @@ -2047,7 +2047,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/zh_Hans/invitation/index.html b/zh_Hans/invitation/index.html index 784dadf06..de2f7b33c 100644 --- a/zh_Hans/invitation/index.html +++ b/zh_Hans/invitation/index.html @@ -785,7 +785,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/zh_Hant/contact/index.html b/zh_Hant/contact/index.html index f8f1d3e50..58dfacfb8 100644 --- a/zh_Hant/contact/index.html +++ b/zh_Hant/contact/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/zh_Hant/fdroid/index.html b/zh_Hant/fdroid/index.html index 2c529e26e..9ce05aaea 100644 --- a/zh_Hant/fdroid/index.html +++ b/zh_Hant/fdroid/index.html @@ -616,7 +616,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia

    diff --git a/zh_Hant/index.html b/zh_Hant/index.html index c6dff3bf8..28822cc14 100644 --- a/zh_Hant/index.html +++ b/zh_Hant/index.html @@ -2039,7 +2039,7 @@ window.addEventListener("load", function () {
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    +

    Wikipedia

    End-to-end encryption

    A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

    Forward secrecy

    Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

    Key exchange

    Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

    Overlay network

    Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

    diff --git a/zh_Hant/invitation/index.html b/zh_Hant/invitation/index.html index 67ad8ee18..6e076726d 100644 --- a/zh_Hant/invitation/index.html +++ b/zh_Hant/invitation/index.html @@ -777,7 +777,7 @@ window.addEventListener('scroll',changeHeaderBg);
  • mitigation of man-in-the-middle attack on client-client out-of-band channel when sending the invitation,
  • rotation of delivery queues to reduce efficiency of traffic analysis,
  • etc.
  • -

    Wikipedia

    +

    Wikipedia